Bug 1215230

Summary: VUL-0: webkit2gtk3: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0008
Product: [Novell Products] SUSE Security Incidents Reporter: Carlos López <carlos.lopez>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: mgorse, os.gnome.maintainers
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/377401/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-28198:8.8:(AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSSv3.1:SUSE:CVE-2023-32370:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) CVSSv3.1:SUSE:CVE-2023-40397:8.8:(AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Carlos López 2023-09-12 06:06:30 UTC
------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2023-0008
------------------------------------------------------------------------

Date reported           : September 11, 2023
Advisory ID             : WSA-2023-0008
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2023-0008.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2023-0008.html
CVE identifiers         : CVE-2023-28198, CVE-2023-32370,
                          CVE-2023-40397.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2023-28198
    Versions affected: WebKitGTK and WPE WebKit before 2.40.1.
    Credit to hazbinhotel working with Trend Micro Zero Day Initiative.
    Impact: Processing web content may lead to arbitrary code execution.
    Description: A use-after-free issue was addressed with improved
    memory management.

CVE-2023-32370
    Versions affected: WebKitGTK and WPE WebKit before 2.40.1.
    Credit to Gertjan Franken of imec-DistriNet, KU Leuven.
    Impact: Content Security Policy to block domains with wildcards may
    fail. Description: A logic issue was addressed with improved
    validation.

CVE-2023-40397
    Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
    Credit to Johan Carlsson (joaxcar).
    Impact: A remote attacker may be able to cause arbitrary javascript
    code execution. Description: The issue was addressed with improved
    checks.


We recommend updating to the latest stable versions of WebKitGTK and WPE
WebKit. It is the best way to ensure that you are running safe versions
of WebKit. Please check our websites for information about the latest
stable releases.

Further information about WebKitGTK and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.

The WebKitGTK and WPE WebKit team,
September 11, 2023
Comment 5 Maintenance Automation 2023-09-25 08:30:07 UTC
SUSE-SU-2023:3753-1: An update that solves 10 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1213379, 1213581, 1213905, 1214093, 1214640, 1214835, 1215072, 1215230
CVE References: CVE-2023-28198, CVE-2023-32370, CVE-2023-37450, CVE-2023-38594, CVE-2023-38595, CVE-2023-38597, CVE-2023-38599, CVE-2023-38600, CVE-2023-38611, CVE-2023-40397
Sources used:
Development Tools Module 15-SP5 (src): webkit2gtk4-2.40.5-150400.4.51.1
openSUSE Leap 15.4 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1, webkit2gtk3-2.40.5-150400.4.51.1, webkit2gtk4-2.40.5-150400.4.51.1
openSUSE Leap 15.5 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1, webkit2gtk3-2.40.5-150400.4.51.1, webkit2gtk4-2.40.5-150400.4.51.1
Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1
Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1
Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.40.5-150400.4.51.1
Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.40.5-150400.4.51.1
Development Tools Module 15-SP4 (src): webkit2gtk4-2.40.5-150400.4.51.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Carlos López 2024-02-22 14:54:32 UTC
Done, closing.